6 - Data Transmission Security Issues Flashcards

(30 cards)

1
Q

Why are we concerned about data transmission security?

A

Because security breaches can lead to lost or stolen business data and reduced network performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is eavesdropping?

A

When someone listens to data being transmitted over a network without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is eavesdropping possible on a LAN?

A

Data is sent to all devices on the LAN, but only the intended device accepts it—malicious users can bypass this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do hackers access data not meant for them?

A

By using tools that stop a computer from ignoring data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is** packet sniffing?**

A

The use of software to inspect all data packets travelling across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who uses packet sniffing legitimately?

A

To steal passwords, credit card details, and confidential data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does packet sniffing software work?

A

It forces a PC to capture and read all network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which networks are most susceptible to packet sniffing?

A
  • Public Wi-Fi (anyone can connect)
  • PANs using Bluetooth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is required to use packet sniffing?

A

Only a connection to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which networks are least susceptible to packet sniffing?

A
  • Mobile broadband (4G/5G)
  • Wired networks (requires physical access)
  • Wired PANs (almost impossible)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is spoofing?

A

When a computer pretends to be another computer on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How are computers identified on a network?

A

By a unique IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is spoofing dangerous?

A

It can trick systems into granting access meant for another device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does spoofing work?

A

Hackers use fake credentials or IP addresses to gain unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What attacks can spoofing enable?

A
  • Data theft
  • Data deletion
  • Denial of Service (DoS) attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does spoofing cause a DoS attack?

A

By sending massive amounts of data while pretending to be a legitimate source.

17
Q

What networks are susceptible to spoofing?

A
  • All network are susceptible
  • Wireless network - easier
  • VPN are also at risk as connection can be spoofed
18
Q

Are VPNs safe from spoofing?

A

No, VPN connections can also be spoofed.

19
Q

What is a firewall?

A

Hardware or software that monitors and blocks unwanted network traffic.

20
Q

What can a firewall do?

A
  • Block websites
  • Prevent data leaving a network
  • Block external access
  • Close network ports
  • Prevent DoS attacks
21
Q

What is a hardware firewall?

A

A physical device or router that sits between the LAN and the internet.

22
Q

How does a hardware firewall work?

A

Uses rules to filter and block unwanted traffic.

23
Q

What is a software firewall?

A

A firewall installed on individual devices.

24
Q

What does a software firewall monitor?

A

Incoming and outgoing traffic from the computer.

25
What is What is encryption??
The process of converting readable data into unreadable coded data.
26
Why is encryption important?
Intercepted data cannot be read without the decryption key.
27
What is SSL (Secure Socket Layer)?
A protocol that encrypts data using digital certificates and PKI.
28
What does PKI stand for?
Public Key Infrastructure.
29
What is TLS?
ransport Layer Security — the modern, secure replacement for SSL.
30
Which is more secure: SSL or TLS?
TLS.